
Mozilla released Firefox 102 as a stable channel with patches for 19 vulnerabilities, including four high-severity bugs.
With this recent patching, Mozilla has patched CVE-2022-34470, a high-severity use-after-free issue in nsSHistory that was triggered when navigating between XML documents, that could lead to a potentially exploitable crash and full system compromise when combined with other vulnerabilities.
CVE-2022-34468, another high-severity flaw addressed, could lead to bypass of a CSP sandbox header without allow-scripts
by using a retargeted javascript: URI and when a user clicks on a javascript: link, an iframe could run scripts without authorization.
CVE-2022-34479, a Linux-specific issue that allows malicious websites to create popup windows that can be resized in a way that the address bar would be overlayed with web content, potentially leading to spoofing attacks.
Multiple memory safety bugs have been assigned CVE-2022-34484, including ones the JavaScript prototype or memory corruption could have been exploited to run arbitrary code.
Firefox 102 also improves user privacy by mitigating query parameter tracking when navigating the internet with Enhanced Tracking Protection (ETP) strict mode enabled by which cross site tracking is prevented
Firefox can block specific tracking parameters that websites may be using to circumvent the privacy protections that browsers have implemented. Firefox new version also handles audio decoding in a separate process that features stricter sandboxing, to enhance process isolation.